skip to main content
Resultados 1 2 3 4 5 next page
Mostrar Somente
Refinado por: assunto: Data Security remover assunto: Public Key Cryptography remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status
Material Type:
Artigo
Adicionar ao Meu Espaço

Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status

Imam, Raza ; Areeb, Qazi Mohammad ; Alturki, Abdulrahman ; Anwer, Faisal

IEEE access, 2021, Vol.9, p.155949-155976 [Periódico revisado por pares]

Piscataway: IEEE

Texto completo disponível

2
Field Programmable Gate Array based elliptic curve Menezes‐Qu‐Vanstone key agreement protocol realization using Physical Unclonable Function and true random number generator primitives
Material Type:
Artigo
Adicionar ao Meu Espaço

Field Programmable Gate Array based elliptic curve Menezes‐Qu‐Vanstone key agreement protocol realization using Physical Unclonable Function and true random number generator primitives

Anandakumar, N. Nalla ; Hashmi, Mohammad S. ; Sanadhya, Somitra Kumar

IET circuits, devices & systems, 2022-08, Vol.16 (5), p.382-398 [Periódico revisado por pares]

Texto completo disponível

3
Towards quantum‐secure software defined networks
Material Type:
Artigo
Adicionar ao Meu Espaço

Towards quantum‐secure software defined networks

Nosouhi, Mohammad Reza ; Sood, Keshav ; Chamola, Vinay ; Jeong, Jongkil Jay ; Gaddam, Anuroop

IET quantum communication, 2024-03, Vol.5 (1), p.66-71 [Periódico revisado por pares]

Wiley

Texto completo disponível

4
GRP-based interleaver for IDMA systems over frequency selective channel
Material Type:
Artigo
Adicionar ao Meu Espaço

GRP-based interleaver for IDMA systems over frequency selective channel

Belaoura, W ; Djeddou, M ; Ghanem, K

Electronics letters, 2015-09, Vol.51 (18), p.1462-1464 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

5
Frequency Domain Horizontal Cross Correlation Analysis of RSA
Material Type:
Artigo
Adicionar ao Meu Espaço

Frequency Domain Horizontal Cross Correlation Analysis of RSA

AKALP KUZU, E. ; TANGEL, A. ; ORS YALCIN, S. B.

Advances in Electrical and Computer Engineering, 2022-05, Vol.22 (2), p.3-10 [Periódico revisado por pares]

Suceava: Stefan cel Mare University of Suceava

Texto completo disponível

6
A modified remote user authentication scheme using smart cards
Material Type:
Artigo
Adicionar ao Meu Espaço

A modified remote user authentication scheme using smart cards

Shen, Jau-Ji ; Lin, Chih-Wei ; Hwang, Min-Shiang

IEEE transactions on consumer electronics, 2003-05, Vol.49 (2), p.414-416 [Periódico revisado por pares]

New York: IEEE

Texto completo disponível

7
A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments
Material Type:
Artigo
Adicionar ao Meu Espaço

A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments

Ming Yu, Ming Yu ; Mengchu Zhou, Mengchu Zhou ; Wei Su, Wei Su

IEEE transactions on vehicular technology, 2009-01, Vol.58 (1), p.449-460 [Periódico revisado por pares]

New York, NY: IEEE

Texto completo disponível

8
Security as a new dimension in embedded system design
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Security as a new dimension in embedded system design

Kocher, Paul ; Lee, Ruby ; McGraw, Gary ; Raghunathan, Anand

Annual ACM IEEE Design Automation Conference: Proceedings of the 41st annual conference on Design automation, 2004, p.753-760

New York, NY, USA: ACM

Texto completo disponível

9
An efficient identity-based cryptosystem for end-to-end mobile security
Material Type:
Artigo
Adicionar ao Meu Espaço

An efficient identity-based cryptosystem for end-to-end mobile security

Hwu, J.-S. ; Chen, R.-J. ; Lin, Y.-B.

IEEE transactions on wireless communications, 2006-09, Vol.5 (9), p.2586-2593 [Periódico revisado por pares]

Piscataway, NJ: IEEE

Texto completo disponível

10
Fingerprinting protocol for images based on additive homomorphic property
Material Type:
Artigo
Adicionar ao Meu Espaço

Fingerprinting protocol for images based on additive homomorphic property

Kuribayashi, M. ; Tanaka, H.

IEEE transactions on image processing, 2005-12, Vol.14 (12), p.2129-2139 [Periódico revisado por pares]

New York, NY: IEEE

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Revistas revisadas por pares (56)

Refinar Meus Resultados

Tipo de Recurso 

  1. Anais de Congresso  (368)
  2. Artigos  (58)
  3. magazinearticle  (8)
  4. Resenhas  (1)
  5. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de1993  (16)
  2. 1993Até1998  (27)
  3. 1999Até2004  (111)
  4. 2005Até2011  (276)
  5. Após 2011  (9)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.